Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe

Overview

General Information

Sample Name:1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
Analysis ID:626643
MD5:7564920df8fdac8a30144d4297173194
SHA1:7e5451c6de3e46983c22ab6fe70eb0c6e5fc21da
SHA256:1da2baedb633fd4884fce89a2d9d8630c2e7af359fe7519f677ad64bcc162a61
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Detected Nanocore Rat
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Yara detected Nanocore RAT
Snort IDS alert for network traffic
Machine Learning detection for sample
.NET source code contains potential unpacker
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Drops PE files
Detected TCP or UDP traffic on non-standard ports

Classification

  • System is w10x64
  • dhcpmon.exe (PID: 4684 cmdline: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" MD5: 7564920DF8FDAC8A30144D4297173194)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "9b13b828-50a9-4487-af40-2faff161", "Group": "Default", "Domain1": "6.tcp.ngrok.io", "Domain2": "6.tcp.ngrok.io", "Port": 10715, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x1018d:$x1: NanoCore.ClientPluginHost
  • 0x101ca:$x2: IClientNetworkHost
  • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xff05:$x1: NanoCore Client.exe
  • 0x1018d:$x2: NanoCore.ClientPluginHost
  • 0x117c6:$s1: PluginCommand
  • 0x117ba:$s2: FileCommand
  • 0x1266b:$s3: PipeExists
  • 0x18422:$s4: PipeCreated
  • 0x101b7:$s5: IClientLoggingHost
1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0xfef5:$x1: NanoCore Client
    • 0xff05:$x1: NanoCore Client
    • 0x1014d:$x2: NanoCore.ClientPlugin
    • 0x1018d:$x3: NanoCore.ClientPluginHost
    • 0x10142:$i1: IClientApp
    • 0x10163:$i2: IClientData
    • 0x1016f:$i3: IClientNetwork
    • 0x1017e:$i4: IClientAppHost
    • 0x101a7:$i5: IClientDataHost
    • 0x101b7:$i6: IClientLoggingHost
    • 0x101ca:$i7: IClientNetworkHost
    • 0x101dd:$i8: IClientUIHost
    • 0x101eb:$i9: IClientNameObjectCollection
    • 0x10207:$i10: IClientReadOnlyNameObjectCollection
    • 0xff54:$s1: ClientPlugin
    • 0x10156:$s1: ClientPlugin
    • 0x1064a:$s2: EndPoint
    • 0x10653:$s3: IPAddress
    • 0x1065d:$s4: IPEndPoint
    • 0x12093:$s6: get_ClientSettings
    • 0x12637:$s7: get_Connected
    1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xff05:$x1: NanoCore Client.exe
    • 0x1018d:$x2: NanoCore.ClientPluginHost
    • 0x117c6:$s1: PluginCommand
    • 0x117ba:$s2: FileCommand
    • 0x1266b:$s3: PipeExists
    • 0x18422:$s4: PipeCreated
    • 0x101b7:$s5: IClientLoggingHost
    C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
      • 0xfef5:$x1: NanoCore Client
      • 0xff05:$x1: NanoCore Client
      • 0x1014d:$x2: NanoCore.ClientPlugin
      • 0x1018d:$x3: NanoCore.ClientPluginHost
      • 0x10142:$i1: IClientApp
      • 0x10163:$i2: IClientData
      • 0x1016f:$i3: IClientNetwork
      • 0x1017e:$i4: IClientAppHost
      • 0x101a7:$i5: IClientDataHost
      • 0x101b7:$i6: IClientLoggingHost
      • 0x101ca:$i7: IClientNetworkHost
      • 0x101dd:$i8: IClientUIHost
      • 0x101eb:$i9: IClientNameObjectCollection
      • 0x10207:$i10: IClientReadOnlyNameObjectCollection
      • 0xff54:$s1: ClientPlugin
      • 0x10156:$s1: ClientPlugin
      • 0x1064a:$s2: EndPoint
      • 0x10653:$s3: IPAddress
      • 0x1065d:$s4: IPEndPoint
      • 0x12093:$s6: get_ClientSettings
      • 0x12637:$s7: get_Connected
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      SourceRuleDescriptionAuthorStrings
      00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0xfcf5:$a: NanoCore
        • 0xfd05:$a: NanoCore
        • 0xff39:$a: NanoCore
        • 0xff4d:$a: NanoCore
        • 0xff8d:$a: NanoCore
        • 0xfd54:$b: ClientPlugin
        • 0xff56:$b: ClientPlugin
        • 0xff96:$b: ClientPlugin
        • 0xfe7b:$c: ProjectData
        • 0x10882:$d: DESCrypto
        • 0x1824e:$e: KeepAlive
        • 0x1623c:$g: LogClientMessage
        • 0x12437:$i: get_Connected
        • 0x10bb8:$j: #=q
        • 0x10be8:$j: #=q
        • 0x10c04:$j: #=q
        • 0x10c34:$j: #=q
        • 0x10c50:$j: #=q
        • 0x10c6c:$j: #=q
        • 0x10c9c:$j: #=q
        • 0x10cb8:$j: #=q
        00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xff8d:$x1: NanoCore.ClientPluginHost
        • 0xffca:$x2: IClientNetworkHost
        • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
        00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          Click to see the 14 entries
          SourceRuleDescriptionAuthorStrings
          4.2.dhcpmon.exe.407e3c4.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xd9ad:$x1: NanoCore.ClientPluginHost
          • 0xd9da:$x2: IClientNetworkHost
          4.2.dhcpmon.exe.407e3c4.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xd9ad:$x2: NanoCore.ClientPluginHost
          • 0xea88:$s4: PipeCreated
          • 0xd9c7:$s5: IClientLoggingHost
          4.2.dhcpmon.exe.407e3c4.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            4.2.dhcpmon.exe.407e3c4.4.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
            • 0xd978:$x2: NanoCore.ClientPlugin
            • 0xd9ad:$x3: NanoCore.ClientPluginHost
            • 0xd96c:$i2: IClientData
            • 0xd98e:$i3: IClientNetwork
            • 0xd99d:$i5: IClientDataHost
            • 0xd9c7:$i6: IClientLoggingHost
            • 0xd9da:$i7: IClientNetworkHost
            • 0xd9ed:$i8: IClientUIHost
            • 0xd9fb:$i9: IClientNameObjectCollection
            • 0xda17:$i10: IClientReadOnlyNameObjectCollection
            • 0xd76a:$s1: ClientPlugin
            • 0xd981:$s1: ClientPlugin
            • 0x129a2:$s6: get_ClientSettings
            4.2.dhcpmon.exe.3053dc4.1.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
            • 0xe75:$x1: NanoCore.ClientPluginHost
            • 0xe8f:$x2: IClientNetworkHost
            Click to see the 30 entries

            AV Detection

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, ProcessId: 6948, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            E-Banking Fraud

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, ProcessId: 6948, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, ProcessId: 6948, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

            Remote Access Functionality

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, ProcessId: 6948, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
            Timestamp:192.168.2.318.189.106.4549758107152816718 05/14/22-18:53:45.756170
            SID:2816718
            Source Port:49758
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549757107152025019 05/14/22-18:53:40.189537
            SID:2025019
            Source Port:49757
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849794107152816766 05/14/22-18:54:36.688201
            SID:2816766
            Source Port:49794
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749806107152816766 05/14/22-18:54:41.730487
            SID:2816766
            Source Port:49806
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149848107152816766 05/14/22-18:54:51.648514
            SID:2816766
            Source Port:49848
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549854107152816766 05/14/22-18:55:01.842670
            SID:2816766
            Source Port:49854
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749883107152025019 05/14/22-18:55:26.161126
            SID:2025019
            Source Port:49883
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.140.223.749740107152025019 05/14/22-18:53:30.583587
            SID:2025019
            Source Port:49740
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149765107152025019 05/14/22-18:54:00.755092
            SID:2025019
            Source Port:49765
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.140.223.749740107152816766 05/14/22-18:53:30.746005
            SID:2816766
            Source Port:49740
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749806107152025019 05/14/22-18:54:41.230236
            SID:2025019
            Source Port:49806
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549759107152025019 05/14/22-18:53:50.228503
            SID:2025019
            Source Port:49759
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149756107152816766 05/14/22-18:53:35.773125
            SID:2816766
            Source Port:49756
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.177.149858107152025019 05/14/22-18:55:06.246494
            SID:2025019
            Source Port:49858
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549758107152025019 05/14/22-18:53:45.315185
            SID:2025019
            Source Port:49758
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.177.149858107152816766 05/14/22-18:55:06.694095
            SID:2816766
            Source Port:49858
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549854107152025019 05/14/22-18:55:01.397157
            SID:2025019
            Source Port:49854
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549886107152025019 05/14/22-18:55:35.481238
            SID:2025019
            Source Port:49886
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149770107152025019 05/14/22-18:54:06.080233
            SID:2025019
            Source Port:49770
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149781107152025019 05/14/22-18:54:15.860094
            SID:2025019
            Source Port:49781
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749884107152025019 05/14/22-18:55:30.861568
            SID:2025019
            Source Port:49884
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149785107152025019 05/14/22-18:54:25.617279
            SID:2025019
            Source Port:49785
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149836107152816766 05/14/22-18:54:46.608305
            SID:2816766
            Source Port:49836
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549791107152816766 05/14/22-18:54:31.286610
            SID:2816766
            Source Port:49791
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849853107152025019 05/14/22-18:54:56.252366
            SID:2025019
            Source Port:49853
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149783107152025019 05/14/22-18:54:20.769932
            SID:2025019
            Source Port:49783
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849874107152025019 05/14/22-18:55:11.701384
            SID:2025019
            Source Port:49874
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149756107152025019 05/14/22-18:53:35.332411
            SID:2025019
            Source Port:49756
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549880107152025019 05/14/22-18:55:16.679672
            SID:2025019
            Source Port:49880
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549880107152816766 05/14/22-18:55:17.122336
            SID:2816766
            Source Port:49880
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549882107152025019 05/14/22-18:55:21.440941
            SID:2025019
            Source Port:49882
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149836107152816718 05/14/22-18:54:46.418129
            SID:2816718
            Source Port:49836
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549882107152816766 05/14/22-18:55:21.882674
            SID:2816766
            Source Port:49882
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749776107152025019 05/14/22-18:54:11.046665
            SID:2025019
            Source Port:49776
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149765107152816766 05/14/22-18:54:00.902736
            SID:2816766
            Source Port:49765
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749760107152816766 05/14/22-18:53:55.476894
            SID:2816766
            Source Port:49760
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849794107152025019 05/14/22-18:54:36.540422
            SID:2025019
            Source Port:49794
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849874107152816766 05/14/22-18:55:12.139699
            SID:2816766
            Source Port:49874
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549757107152816766 05/14/22-18:53:40.555893
            SID:2816766
            Source Port:49757
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549758107152816766 05/14/22-18:53:45.756170
            SID:2816766
            Source Port:49758
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149785107152816766 05/14/22-18:54:25.912977
            SID:2816766
            Source Port:49785
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749776107152816766 05/14/22-18:54:11.487905
            SID:2816766
            Source Port:49776
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549759107152816766 05/14/22-18:53:50.666342
            SID:2816766
            Source Port:49759
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149783107152816766 05/14/22-18:54:21.223616
            SID:2816766
            Source Port:49783
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749760107152025019 05/14/22-18:53:55.034238
            SID:2025019
            Source Port:49760
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.132.159.15849853107152816766 05/14/22-18:54:56.699602
            SID:2816766
            Source Port:49853
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149781107152816766 05/14/22-18:54:16.302738
            SID:2816766
            Source Port:49781
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149770107152816766 05/14/22-18:54:06.525535
            SID:2816766
            Source Port:49770
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749884107152816766 05/14/22-18:55:31.304803
            SID:2816766
            Source Port:49884
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.318.189.106.4549791107152025019 05/14/22-18:54:30.845080
            SID:2025019
            Source Port:49791
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149836107152025019 05/14/22-18:54:46.122377
            SID:2025019
            Source Port:49836
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.142.21149848107152025019 05/14/22-18:54:51.048070
            SID:2025019
            Source Port:49848
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.33.141.210.3749883107152816766 05/14/22-18:55:26.602738
            SID:2816766
            Source Port:49883
            Destination Port:10715
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "9b13b828-50a9-4487-af40-2faff161", "Group": "Default", "Domain1": "6.tcp.ngrok.io", "Domain2": "6.tcp.ngrok.io", "Port": 10715, "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMetadefender: Detection: 82%Perma Link
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeReversingLabs: Detection: 100%
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeAvira: detected
            Source: 6.tcp.ngrok.ioAvira URL Cloud: Label: malware
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMetadefender: Detection: 82%Perma Link
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 97%
            Source: Yara matchFile source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 4.0.dhcpmon.exe.a30000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 4.2.dhcpmon.exe.a30000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll

            Networking

            barindex
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49740 -> 3.140.223.7:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49740 -> 3.140.223.7:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49756 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49756 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49757 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49757 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49758 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49758 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49758 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49759 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49759 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49760 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49760 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49765 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49765 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49770 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49770 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49776 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49776 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49781 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49781 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49783 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49783 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49785 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49785 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49791 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49791 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49794 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49794 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49806 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49806 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49836 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49836 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816718 ETPRO TROJAN NanoCore RAT Keep-Alive Beacon 192.168.2.3:49836 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49848 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49848 -> 3.141.142.211:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49853 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49853 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49854 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49854 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49858 -> 3.141.177.1:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49858 -> 3.141.177.1:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49874 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49874 -> 3.132.159.158:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49880 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49880 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49882 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49882 -> 18.189.106.45:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49883 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49883 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49884 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2816766 ETPRO TROJAN NanoCore RAT CnC 7 192.168.2.3:49884 -> 3.141.210.37:10715
            Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49886 -> 18.189.106.45:10715
            Source: Malware configuration extractorURLs: 6.tcp.ngrok.io
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: Joe Sandbox ViewIP Address: 3.141.142.211 3.141.142.211
            Source: Joe Sandbox ViewIP Address: 18.189.106.45 18.189.106.45
            Source: global trafficTCP traffic: 192.168.2.3:49740 -> 3.140.223.7:10715
            Source: global trafficTCP traffic: 192.168.2.3:49756 -> 3.141.142.211:10715
            Source: global trafficTCP traffic: 192.168.2.3:49757 -> 18.189.106.45:10715
            Source: global trafficTCP traffic: 192.168.2.3:49760 -> 3.141.210.37:10715
            Source: global trafficTCP traffic: 192.168.2.3:49794 -> 3.132.159.158:10715
            Source: global trafficTCP traffic: 192.168.2.3:49858 -> 3.141.177.1:10715
            Source: unknownDNS traffic detected: queries for: 6.tcp.ngrok.io
            Source: dhcpmon.exe, 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: RegisterRawInputDevices

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            System Summary

            barindex
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.2.dhcpmon.exe.3053dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.3053dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.2.dhcpmon.exe.3053dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.3053dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.3053dc4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00A3524A
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_05223850
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_052223A0
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_05222FA8
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0522306F
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeStatic PE information: Section: .rsrc ZLIB complexity 0.999352678571
            Source: dhcpmon.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.999352678571
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMetadefender: Detection: 82%
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeReversingLabs: Detection: 100%
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile read: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeJump to behavior
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe "C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe"
            Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
            Source: classification engineClassification label: mal100.troj.evad.winEXE@2/4@26/7
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{9b13b828-50a9-4487-af40-2faff161b8ef}
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: dhcpmon.exe.0.dr, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR

            Data Obfuscation

            barindex
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: dhcpmon.exe.0.dr, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A489E4 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeCode function: 0_3_00A4AF50 push edx; ret
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: dhcpmon.exe.0.dr, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: dhcpmon.exe.0.dr, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 4.0.dhcpmon.exe.a30000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
            Source: 4.2.dhcpmon.exe.a30000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeFile opened: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe TID: 6996Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe TID: 6992Thread sleep time: -40000s >= -30000s
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5864Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeWindow / User API: threadDelayed 355
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeWindow / User API: foregroundWindowGot 1207
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeThread delayed: delay time: 922337203685477
            Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeBinary or memory string: Hyper-V RAW
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.293042675.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.255624504.0000000000A3F000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.415011056.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.457121820.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.370868279.0000000000A32000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.358761592.0000000000A34000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.260967686.0000000000A3F000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.260435353.0000000000A3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlld
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeMemory allocated: page read and write | page guard
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.457121820.0000000000A38000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.370868279.0000000000A32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.282244184.0000000000A3F000.00000004.00000020.00020000.00000000.sdmp, 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000003.275524638.0000000000A3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager,d
            Source: C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dhcpmon.exe, 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe, 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dhcpmon.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
            Source: Yara matchFile source: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, type: SAMPLE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.0.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.40829ed.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407e3c4.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.a30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 4.2.dhcpmon.exe.407958e.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe PID: 6948, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 4684, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, type: DROPPED
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath Interception2
            Process Injection
            2
            Masquerading
            11
            Input Capture
            11
            Security Software Discovery
            Remote Services11
            Input Capture
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory2
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Remote Access Software
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets2
            System Information Discovery
            SSHKeyloggingData Transfer Size Limits11
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Hidden Files and Directories
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Obfuscated Files or Information
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job12
            Software Packing
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe83%MetadefenderBrowse
            1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe100%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
            1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe100%AviraTR/Dropper.MSIL.Gen7
            1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%AviraTR/Dropper.MSIL.Gen7
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe83%MetadefenderBrowse
            C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe98%ReversingLabsByteCode-MSIL.Backdoor.NanoCore
            SourceDetectionScannerLabelLinkDownload
            0.0.1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe.300000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            4.0.dhcpmon.exe.a30000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            4.2.dhcpmon.exe.a30000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            6.tcp.ngrok.io100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            6.tcp.ngrok.io
            3.140.223.7
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              6.tcp.ngrok.iotrue
              • Avira URL Cloud: malware
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              3.141.142.211
              unknownUnited States
              16509AMAZON-02UStrue
              18.189.106.45
              unknownUnited States
              16509AMAZON-02UStrue
              3.141.210.37
              unknownUnited States
              16509AMAZON-02UStrue
              3.140.223.7
              6.tcp.ngrok.ioUnited States
              16509AMAZON-02UStrue
              3.141.177.1
              unknownUnited States
              16509AMAZON-02UStrue
              3.132.159.158
              unknownUnited States
              16509AMAZON-02UStrue
              IP
              192.168.2.1
              Joe Sandbox Version:34.0.0 Boulder Opal
              Analysis ID:626643
              Start date and time: 14/05/202218:52:252022-05-14 18:52:25 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 7m 53s
              Hypervisor based Inspection enabled:false
              Report type:light
              Sample file name:1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:25
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@2/4@26/7
              EGA Information:
              • Successful, ratio: 50%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Adjust boot time
              • Enable AMSI
              • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
              • TCP Packets have been reduced to 100
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, settings-win.data.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
              • Execution Graph export aborted for target 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe, PID 6948 because there are no executed function
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtDeviceIoControlFile calls found.
              • VT rate limit hit for: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              TimeTypeDescription
              18:53:28API Interceptor1000x Sleep call for process: 1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe modified
              18:53:29AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              No context
              No context
              No context
              No context
              No context
              Process:C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):207360
              Entropy (8bit):7.44673871085536
              Encrypted:false
              SSDEEP:6144:gLV6Bta6dtJmakIM5HlWUu5LYkO0TrWSB:gLV6BtpmkIlM5LYkO0TKM
              MD5:7564920DF8FDAC8A30144D4297173194
              SHA1:7E5451C6DE3E46983C22AB6FE70EB0C6E5FC21DA
              SHA-256:1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE7519F677AD64BCC162A61
              SHA-512:A208A85DAB10B37E344D5EBED56C05DD09C93EACC6AAAE610DD5D4E8E395A3788CBE6342C7000A27CBDCBCABED6E5043FABF5D796853794A9498AFDF0332D6F6
              Malicious:true
              Yara Hits:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
              • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Metadefender, Detection: 83%, Browse
              • Antivirus: ReversingLabs, Detection: 98%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. ......................................................................8...W.... ..p]........................................................................... ............... ..H............text........ ...................... ..`.reloc..............................@..B.rsrc...p]... ...^..................@..@................t.......H...........T............................................................0..Q........o5.......*.o6....-.&......3+..+.... ....3......1..... 2.... ....3.... .......*.*....0..E.......s7....-(&s8....-&&s9....,$&s:........s;........*.....+.....+.....+.....0..........~....o<...*..0..........~....o=...*..0..........~....o>...*..0..........~....o?...*..0..........~....o@...*..0.............-.&(A...*&+...0..$.......~B........-.(...+.-.&+..B...+.~B...*.0.............-.&(A...*&+...0..
              Process:C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):525
              Entropy (8bit):5.2874233355119316
              Encrypted:false
              SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
              MD5:61CCF53571C9ABA6511D696CB0D32E45
              SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
              SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
              SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
              Malicious:true
              Reputation:high, very likely benign file
              Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
              Process:C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:Jtn:jn
              MD5:24DE9846E6AE08C5DCA9BCDA9F509FC1
              SHA1:CFA73A7289F9EC1FEC3DCDAB3B7D6FC788BF52B7
              SHA-256:0EA4EE35E4DB371C1C0ACCC8D42C119750B93519D77263572574AD7EE2321E5B
              SHA-512:BF56D6F04A2402E3B064ACE5B2FB0B3B8E201EBA90BF713430347063CE4D5736F23C07652B3E5FD0DC60BB533AF463A136BBB64DCC6ACE6EE98F7104A9D82B52
              Malicious:true
              Reputation:low
              Preview:..Z..6.H
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.44673871085536
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              File size:207360
              MD5:7564920df8fdac8a30144d4297173194
              SHA1:7e5451c6de3e46983c22ab6fe70eb0c6e5fc21da
              SHA256:1da2baedb633fd4884fce89a2d9d8630c2e7af359fe7519f677ad64bcc162a61
              SHA512:a208a85dab10b37e344d5ebed56c05dd09c93eacc6aaae610dd5d4e8e395a3788cbe6342c7000a27cbdcbcabed6e5043fabf5d796853794a9498afdf0332d6f6
              SSDEEP:6144:gLV6Bta6dtJmakIM5HlWUu5LYkO0TrWSB:gLV6BtpmkIlM5LYkO0TKM
              TLSH:4914BF5677E94A2FE2DE86B9602211128379C2E3E8C3F7DE28D454F78B267E406071D3
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'.T.....................`........... ........@.. .....................................................................
              Icon Hash:00828e8e8686b000
              Entrypoint:0x41e792
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED
              DLL Characteristics:
              Time Stamp:0x54E927A1 [Sun Feb 22 00:49:37 2015 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v2.0.50727
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1e7380x57.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x220000x15d70.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x200000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x1c7980x1c800False0.594503837719data6.59807178823IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .reloc0x200000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              .rsrc0x220000x15d700x15e00False0.999352678571data7.99767001734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountry
              RT_RCDATA0x220580x15d18TIM image, (20535,52663)
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              192.168.2.318.189.106.4549758107152816718 05/14/22-18:53:45.756170TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4975810715192.168.2.318.189.106.45
              192.168.2.318.189.106.4549757107152025019 05/14/22-18:53:40.189537TCP2025019ET TROJAN Possible NanoCore C2 60B4975710715192.168.2.318.189.106.45
              192.168.2.33.132.159.15849794107152816766 05/14/22-18:54:36.688201TCP2816766ETPRO TROJAN NanoCore RAT CnC 74979410715192.168.2.33.132.159.158
              192.168.2.33.141.210.3749806107152816766 05/14/22-18:54:41.730487TCP2816766ETPRO TROJAN NanoCore RAT CnC 74980610715192.168.2.33.141.210.37
              192.168.2.33.141.142.21149848107152816766 05/14/22-18:54:51.648514TCP2816766ETPRO TROJAN NanoCore RAT CnC 74984810715192.168.2.33.141.142.211
              192.168.2.318.189.106.4549854107152816766 05/14/22-18:55:01.842670TCP2816766ETPRO TROJAN NanoCore RAT CnC 74985410715192.168.2.318.189.106.45
              192.168.2.33.141.210.3749883107152025019 05/14/22-18:55:26.161126TCP2025019ET TROJAN Possible NanoCore C2 60B4988310715192.168.2.33.141.210.37
              192.168.2.33.140.223.749740107152025019 05/14/22-18:53:30.583587TCP2025019ET TROJAN Possible NanoCore C2 60B4974010715192.168.2.33.140.223.7
              192.168.2.33.141.142.21149765107152025019 05/14/22-18:54:00.755092TCP2025019ET TROJAN Possible NanoCore C2 60B4976510715192.168.2.33.141.142.211
              192.168.2.33.140.223.749740107152816766 05/14/22-18:53:30.746005TCP2816766ETPRO TROJAN NanoCore RAT CnC 74974010715192.168.2.33.140.223.7
              192.168.2.33.141.210.3749806107152025019 05/14/22-18:54:41.230236TCP2025019ET TROJAN Possible NanoCore C2 60B4980610715192.168.2.33.141.210.37
              192.168.2.318.189.106.4549759107152025019 05/14/22-18:53:50.228503TCP2025019ET TROJAN Possible NanoCore C2 60B4975910715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149756107152816766 05/14/22-18:53:35.773125TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975610715192.168.2.33.141.142.211
              192.168.2.33.141.177.149858107152025019 05/14/22-18:55:06.246494TCP2025019ET TROJAN Possible NanoCore C2 60B4985810715192.168.2.33.141.177.1
              192.168.2.318.189.106.4549758107152025019 05/14/22-18:53:45.315185TCP2025019ET TROJAN Possible NanoCore C2 60B4975810715192.168.2.318.189.106.45
              192.168.2.33.141.177.149858107152816766 05/14/22-18:55:06.694095TCP2816766ETPRO TROJAN NanoCore RAT CnC 74985810715192.168.2.33.141.177.1
              192.168.2.318.189.106.4549854107152025019 05/14/22-18:55:01.397157TCP2025019ET TROJAN Possible NanoCore C2 60B4985410715192.168.2.318.189.106.45
              192.168.2.318.189.106.4549886107152025019 05/14/22-18:55:35.481238TCP2025019ET TROJAN Possible NanoCore C2 60B4988610715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149770107152025019 05/14/22-18:54:06.080233TCP2025019ET TROJAN Possible NanoCore C2 60B4977010715192.168.2.33.141.142.211
              192.168.2.33.141.142.21149781107152025019 05/14/22-18:54:15.860094TCP2025019ET TROJAN Possible NanoCore C2 60B4978110715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749884107152025019 05/14/22-18:55:30.861568TCP2025019ET TROJAN Possible NanoCore C2 60B4988410715192.168.2.33.141.210.37
              192.168.2.33.141.142.21149785107152025019 05/14/22-18:54:25.617279TCP2025019ET TROJAN Possible NanoCore C2 60B4978510715192.168.2.33.141.142.211
              192.168.2.33.141.142.21149836107152816766 05/14/22-18:54:46.608305TCP2816766ETPRO TROJAN NanoCore RAT CnC 74983610715192.168.2.33.141.142.211
              192.168.2.318.189.106.4549791107152816766 05/14/22-18:54:31.286610TCP2816766ETPRO TROJAN NanoCore RAT CnC 74979110715192.168.2.318.189.106.45
              192.168.2.33.132.159.15849853107152025019 05/14/22-18:54:56.252366TCP2025019ET TROJAN Possible NanoCore C2 60B4985310715192.168.2.33.132.159.158
              192.168.2.33.141.142.21149783107152025019 05/14/22-18:54:20.769932TCP2025019ET TROJAN Possible NanoCore C2 60B4978310715192.168.2.33.141.142.211
              192.168.2.33.132.159.15849874107152025019 05/14/22-18:55:11.701384TCP2025019ET TROJAN Possible NanoCore C2 60B4987410715192.168.2.33.132.159.158
              192.168.2.33.141.142.21149756107152025019 05/14/22-18:53:35.332411TCP2025019ET TROJAN Possible NanoCore C2 60B4975610715192.168.2.33.141.142.211
              192.168.2.318.189.106.4549880107152025019 05/14/22-18:55:16.679672TCP2025019ET TROJAN Possible NanoCore C2 60B4988010715192.168.2.318.189.106.45
              192.168.2.318.189.106.4549880107152816766 05/14/22-18:55:17.122336TCP2816766ETPRO TROJAN NanoCore RAT CnC 74988010715192.168.2.318.189.106.45
              192.168.2.318.189.106.4549882107152025019 05/14/22-18:55:21.440941TCP2025019ET TROJAN Possible NanoCore C2 60B4988210715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149836107152816718 05/14/22-18:54:46.418129TCP2816718ETPRO TROJAN NanoCore RAT Keep-Alive Beacon4983610715192.168.2.33.141.142.211
              192.168.2.318.189.106.4549882107152816766 05/14/22-18:55:21.882674TCP2816766ETPRO TROJAN NanoCore RAT CnC 74988210715192.168.2.318.189.106.45
              192.168.2.33.141.210.3749776107152025019 05/14/22-18:54:11.046665TCP2025019ET TROJAN Possible NanoCore C2 60B4977610715192.168.2.33.141.210.37
              192.168.2.33.141.142.21149765107152816766 05/14/22-18:54:00.902736TCP2816766ETPRO TROJAN NanoCore RAT CnC 74976510715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749760107152816766 05/14/22-18:53:55.476894TCP2816766ETPRO TROJAN NanoCore RAT CnC 74976010715192.168.2.33.141.210.37
              192.168.2.33.132.159.15849794107152025019 05/14/22-18:54:36.540422TCP2025019ET TROJAN Possible NanoCore C2 60B4979410715192.168.2.33.132.159.158
              192.168.2.33.132.159.15849874107152816766 05/14/22-18:55:12.139699TCP2816766ETPRO TROJAN NanoCore RAT CnC 74987410715192.168.2.33.132.159.158
              192.168.2.318.189.106.4549757107152816766 05/14/22-18:53:40.555893TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975710715192.168.2.318.189.106.45
              192.168.2.318.189.106.4549758107152816766 05/14/22-18:53:45.756170TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975810715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149785107152816766 05/14/22-18:54:25.912977TCP2816766ETPRO TROJAN NanoCore RAT CnC 74978510715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749776107152816766 05/14/22-18:54:11.487905TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977610715192.168.2.33.141.210.37
              192.168.2.318.189.106.4549759107152816766 05/14/22-18:53:50.666342TCP2816766ETPRO TROJAN NanoCore RAT CnC 74975910715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149783107152816766 05/14/22-18:54:21.223616TCP2816766ETPRO TROJAN NanoCore RAT CnC 74978310715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749760107152025019 05/14/22-18:53:55.034238TCP2025019ET TROJAN Possible NanoCore C2 60B4976010715192.168.2.33.141.210.37
              192.168.2.33.132.159.15849853107152816766 05/14/22-18:54:56.699602TCP2816766ETPRO TROJAN NanoCore RAT CnC 74985310715192.168.2.33.132.159.158
              192.168.2.33.141.142.21149781107152816766 05/14/22-18:54:16.302738TCP2816766ETPRO TROJAN NanoCore RAT CnC 74978110715192.168.2.33.141.142.211
              192.168.2.33.141.142.21149770107152816766 05/14/22-18:54:06.525535TCP2816766ETPRO TROJAN NanoCore RAT CnC 74977010715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749884107152816766 05/14/22-18:55:31.304803TCP2816766ETPRO TROJAN NanoCore RAT CnC 74988410715192.168.2.33.141.210.37
              192.168.2.318.189.106.4549791107152025019 05/14/22-18:54:30.845080TCP2025019ET TROJAN Possible NanoCore C2 60B4979110715192.168.2.318.189.106.45
              192.168.2.33.141.142.21149836107152025019 05/14/22-18:54:46.122377TCP2025019ET TROJAN Possible NanoCore C2 60B4983610715192.168.2.33.141.142.211
              192.168.2.33.141.142.21149848107152025019 05/14/22-18:54:51.048070TCP2025019ET TROJAN Possible NanoCore C2 60B4984810715192.168.2.33.141.142.211
              192.168.2.33.141.210.3749883107152816766 05/14/22-18:55:26.602738TCP2816766ETPRO TROJAN NanoCore RAT CnC 74988310715192.168.2.33.141.210.37
              TimestampSource PortDest PortSource IPDest IP
              May 14, 2022 18:53:30.152717113 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.300458908 CEST10715497403.140.223.7192.168.2.3
              May 14, 2022 18:53:30.300592899 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.583586931 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.731373072 CEST10715497403.140.223.7192.168.2.3
              May 14, 2022 18:53:30.731479883 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.745915890 CEST10715497403.140.223.7192.168.2.3
              May 14, 2022 18:53:30.746005058 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.752690077 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:30.893910885 CEST10715497403.140.223.7192.168.2.3
              May 14, 2022 18:53:30.894033909 CEST4974010715192.168.2.33.140.223.7
              May 14, 2022 18:53:35.177712917 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.325093985 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.325269938 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.332411051 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.479594946 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.480998039 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.628302097 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.628876925 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.771130085 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.773124933 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.773258924 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.776134968 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.776266098 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:35.920591116 CEST10715497563.141.142.211192.168.2.3
              May 14, 2022 18:53:35.920778036 CEST4975610715192.168.2.33.141.142.211
              May 14, 2022 18:53:40.026853085 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.174282074 CEST107154975718.189.106.45192.168.2.3
              May 14, 2022 18:53:40.174491882 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.189537048 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.336873055 CEST107154975718.189.106.45192.168.2.3
              May 14, 2022 18:53:40.336997986 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.484273911 CEST107154975718.189.106.45192.168.2.3
              May 14, 2022 18:53:40.555892944 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.629710913 CEST107154975718.189.106.45192.168.2.3
              May 14, 2022 18:53:40.629822016 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.631099939 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:40.703073025 CEST107154975718.189.106.45192.168.2.3
              May 14, 2022 18:53:40.703206062 CEST4975710715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.166917086 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.314317942 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.314440012 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.315185070 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.462436914 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.463409901 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.610654116 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.618048906 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.755908012 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.756170034 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.756222963 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.765223980 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.767869949 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:45.903568029 CEST107154975818.189.106.45192.168.2.3
              May 14, 2022 18:53:45.905920982 CEST4975810715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.075531006 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.223118067 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.223277092 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.228502989 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.375870943 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.376728058 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.524233103 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.524324894 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.664855957 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.666342020 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.666410923 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.671622992 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.673928976 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:50.813819885 CEST107154975918.189.106.45192.168.2.3
              May 14, 2022 18:53:50.814275980 CEST4975910715192.168.2.318.189.106.45
              May 14, 2022 18:53:54.885710001 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.033107042 CEST10715497603.141.210.37192.168.2.3
              May 14, 2022 18:53:55.033243895 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.034238100 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.181597948 CEST10715497603.141.210.37192.168.2.3
              May 14, 2022 18:53:55.181685925 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.329044104 CEST10715497603.141.210.37192.168.2.3
              May 14, 2022 18:53:55.329144955 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.476773977 CEST10715497603.141.210.37192.168.2.3
              May 14, 2022 18:53:55.476893902 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.478843927 CEST10715497603.141.210.37192.168.2.3
              May 14, 2022 18:53:55.478924990 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:53:55.479059935 CEST4976010715192.168.2.33.141.210.37
              May 14, 2022 18:54:00.582742929 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:00.730499029 CEST10715497653.141.142.211192.168.2.3
              May 14, 2022 18:54:00.730712891 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:00.755091906 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:00.902534008 CEST10715497653.141.142.211192.168.2.3
              May 14, 2022 18:54:00.902735949 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:01.050062895 CEST10715497653.141.142.211192.168.2.3
              May 14, 2022 18:54:01.178420067 CEST10715497653.141.142.211192.168.2.3
              May 14, 2022 18:54:01.353086948 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:01.642544985 CEST4976510715192.168.2.33.141.142.211
              May 14, 2022 18:54:05.931350946 CEST4977010715192.168.2.33.141.142.211
              May 14, 2022 18:54:06.078870058 CEST10715497703.141.142.211192.168.2.3
              May 14, 2022 18:54:06.079674959 CEST4977010715192.168.2.33.141.142.211
              May 14, 2022 18:54:06.080233097 CEST4977010715192.168.2.33.141.142.211
              May 14, 2022 18:54:06.227596998 CEST10715497703.141.142.211192.168.2.3
              May 14, 2022 18:54:06.230441093 CEST4977010715192.168.2.33.141.142.211
              May 14, 2022 18:54:06.377821922 CEST10715497703.141.142.211192.168.2.3
              May 14, 2022 18:54:06.377979040 CEST4977010715192.168.2.33.141.142.211
              TimestampSource PortDest PortSource IPDest IP
              May 14, 2022 18:53:30.123356104 CEST5742153192.168.2.38.8.8.8
              May 14, 2022 18:53:30.139904022 CEST53574218.8.8.8192.168.2.3
              May 14, 2022 18:53:35.043431997 CEST6535853192.168.2.38.8.8.8
              May 14, 2022 18:53:35.062048912 CEST53653588.8.8.8192.168.2.3
              May 14, 2022 18:53:39.983046055 CEST4987353192.168.2.38.8.8.8
              May 14, 2022 18:53:40.001665115 CEST53498738.8.8.8192.168.2.3
              May 14, 2022 18:53:45.130386114 CEST5380253192.168.2.38.8.8.8
              May 14, 2022 18:53:45.148720980 CEST53538028.8.8.8192.168.2.3
              May 14, 2022 18:53:50.055612087 CEST6526653192.168.2.38.8.8.8
              May 14, 2022 18:53:50.074321032 CEST53652668.8.8.8192.168.2.3
              May 14, 2022 18:53:54.865468025 CEST6333253192.168.2.38.8.8.8
              May 14, 2022 18:53:54.884104013 CEST53633328.8.8.8192.168.2.3
              May 14, 2022 18:54:00.538901091 CEST5139153192.168.2.38.8.8.8
              May 14, 2022 18:54:00.557221889 CEST53513918.8.8.8192.168.2.3
              May 14, 2022 18:54:05.910094976 CEST5298553192.168.2.38.8.8.8
              May 14, 2022 18:54:05.930022001 CEST53529858.8.8.8192.168.2.3
              May 14, 2022 18:54:10.878411055 CEST5077853192.168.2.38.8.8.8
              May 14, 2022 18:54:10.896574020 CEST53507788.8.8.8192.168.2.3
              May 14, 2022 18:54:15.692712069 CEST5939053192.168.2.38.8.8.8
              May 14, 2022 18:54:15.709459066 CEST53593908.8.8.8192.168.2.3
              May 14, 2022 18:54:20.602340937 CEST6499653192.168.2.38.8.8.8
              May 14, 2022 18:54:20.620956898 CEST53649968.8.8.8192.168.2.3
              May 14, 2022 18:54:25.447983980 CEST5209653192.168.2.38.8.8.8
              May 14, 2022 18:54:25.466384888 CEST53520968.8.8.8192.168.2.3
              May 14, 2022 18:54:30.676806927 CEST4984453192.168.2.38.8.8.8
              May 14, 2022 18:54:30.695350885 CEST53498448.8.8.8192.168.2.3
              May 14, 2022 18:54:36.010186911 CEST4972353192.168.2.38.8.8.8
              May 14, 2022 18:54:36.031011105 CEST53497238.8.8.8192.168.2.3
              May 14, 2022 18:54:41.064217091 CEST6187753192.168.2.38.8.8.8
              May 14, 2022 18:54:41.080579042 CEST53618778.8.8.8192.168.2.3
              May 14, 2022 18:54:45.954760075 CEST6155553192.168.2.38.8.8.8
              May 14, 2022 18:54:45.973352909 CEST53615558.8.8.8192.168.2.3
              May 14, 2022 18:54:50.838273048 CEST5155753192.168.2.38.8.8.8
              May 14, 2022 18:54:50.856714964 CEST53515578.8.8.8192.168.2.3
              May 14, 2022 18:54:56.082479000 CEST5248753192.168.2.38.8.8.8
              May 14, 2022 18:54:56.100958109 CEST53524878.8.8.8192.168.2.3
              May 14, 2022 18:55:01.203088045 CEST5199453192.168.2.38.8.8.8
              May 14, 2022 18:55:01.223702908 CEST53519948.8.8.8192.168.2.3
              May 14, 2022 18:55:06.072969913 CEST5895053192.168.2.38.8.8.8
              May 14, 2022 18:55:06.091731071 CEST53589508.8.8.8192.168.2.3
              May 14, 2022 18:55:11.520415068 CEST5388353192.168.2.38.8.8.8
              May 14, 2022 18:55:11.539225101 CEST53538838.8.8.8192.168.2.3
              May 14, 2022 18:55:16.511949062 CEST5906553192.168.2.38.8.8.8
              May 14, 2022 18:55:16.530073881 CEST53590658.8.8.8192.168.2.3
              May 14, 2022 18:55:21.275295019 CEST6458953192.168.2.38.8.8.8
              May 14, 2022 18:55:21.291465998 CEST53645898.8.8.8192.168.2.3
              May 14, 2022 18:55:25.990437984 CEST6493453192.168.2.38.8.8.8
              May 14, 2022 18:55:26.008608103 CEST53649348.8.8.8192.168.2.3
              May 14, 2022 18:55:30.696547031 CEST5579553192.168.2.38.8.8.8
              May 14, 2022 18:55:30.712841988 CEST53557958.8.8.8192.168.2.3
              May 14, 2022 18:55:35.315671921 CEST5526953192.168.2.38.8.8.8
              May 14, 2022 18:55:35.332572937 CEST53552698.8.8.8192.168.2.3
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              May 14, 2022 18:53:30.123356104 CEST192.168.2.38.8.8.80xbdbbStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:53:35.043431997 CEST192.168.2.38.8.8.80x8498Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:53:39.983046055 CEST192.168.2.38.8.8.80xbd83Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:53:45.130386114 CEST192.168.2.38.8.8.80x78a9Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:53:50.055612087 CEST192.168.2.38.8.8.80x8955Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:53:54.865468025 CEST192.168.2.38.8.8.80xb083Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:00.538901091 CEST192.168.2.38.8.8.80xbc15Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:05.910094976 CEST192.168.2.38.8.8.80x5516Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:10.878411055 CEST192.168.2.38.8.8.80xf614Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:15.692712069 CEST192.168.2.38.8.8.80x4c7fStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:20.602340937 CEST192.168.2.38.8.8.80xd61fStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:25.447983980 CEST192.168.2.38.8.8.80x6a3eStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:30.676806927 CEST192.168.2.38.8.8.80xec3bStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:36.010186911 CEST192.168.2.38.8.8.80xe2acStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:41.064217091 CEST192.168.2.38.8.8.80x4a9cStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:45.954760075 CEST192.168.2.38.8.8.80xab74Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:50.838273048 CEST192.168.2.38.8.8.80xf6e8Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:54:56.082479000 CEST192.168.2.38.8.8.80x64f0Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:01.203088045 CEST192.168.2.38.8.8.80xebf4Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:06.072969913 CEST192.168.2.38.8.8.80x67d5Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:11.520415068 CEST192.168.2.38.8.8.80x9d90Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:16.511949062 CEST192.168.2.38.8.8.80x4a6Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:21.275295019 CEST192.168.2.38.8.8.80xcd3eStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:25.990437984 CEST192.168.2.38.8.8.80xaee9Standard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:30.696547031 CEST192.168.2.38.8.8.80x371aStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              May 14, 2022 18:55:35.315671921 CEST192.168.2.38.8.8.80x6b7dStandard query (0)6.tcp.ngrok.ioA (IP address)IN (0x0001)
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              May 14, 2022 18:53:30.139904022 CEST8.8.8.8192.168.2.30xbdbbNo error (0)6.tcp.ngrok.io3.140.223.7A (IP address)IN (0x0001)
              May 14, 2022 18:53:35.062048912 CEST8.8.8.8192.168.2.30x8498No error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:53:40.001665115 CEST8.8.8.8192.168.2.30xbd83No error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:53:45.148720980 CEST8.8.8.8192.168.2.30x78a9No error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:53:50.074321032 CEST8.8.8.8192.168.2.30x8955No error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:53:54.884104013 CEST8.8.8.8192.168.2.30xb083No error (0)6.tcp.ngrok.io3.141.210.37A (IP address)IN (0x0001)
              May 14, 2022 18:54:00.557221889 CEST8.8.8.8192.168.2.30xbc15No error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:05.930022001 CEST8.8.8.8192.168.2.30x5516No error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:10.896574020 CEST8.8.8.8192.168.2.30xf614No error (0)6.tcp.ngrok.io3.141.210.37A (IP address)IN (0x0001)
              May 14, 2022 18:54:15.709459066 CEST8.8.8.8192.168.2.30x4c7fNo error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:20.620956898 CEST8.8.8.8192.168.2.30xd61fNo error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:25.466384888 CEST8.8.8.8192.168.2.30x6a3eNo error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:30.695350885 CEST8.8.8.8192.168.2.30xec3bNo error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:54:36.031011105 CEST8.8.8.8192.168.2.30xe2acNo error (0)6.tcp.ngrok.io3.132.159.158A (IP address)IN (0x0001)
              May 14, 2022 18:54:41.080579042 CEST8.8.8.8192.168.2.30x4a9cNo error (0)6.tcp.ngrok.io3.141.210.37A (IP address)IN (0x0001)
              May 14, 2022 18:54:45.973352909 CEST8.8.8.8192.168.2.30xab74No error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:50.856714964 CEST8.8.8.8192.168.2.30xf6e8No error (0)6.tcp.ngrok.io3.141.142.211A (IP address)IN (0x0001)
              May 14, 2022 18:54:56.100958109 CEST8.8.8.8192.168.2.30x64f0No error (0)6.tcp.ngrok.io3.132.159.158A (IP address)IN (0x0001)
              May 14, 2022 18:55:01.223702908 CEST8.8.8.8192.168.2.30xebf4No error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:55:06.091731071 CEST8.8.8.8192.168.2.30x67d5No error (0)6.tcp.ngrok.io3.141.177.1A (IP address)IN (0x0001)
              May 14, 2022 18:55:11.539225101 CEST8.8.8.8192.168.2.30x9d90No error (0)6.tcp.ngrok.io3.132.159.158A (IP address)IN (0x0001)
              May 14, 2022 18:55:16.530073881 CEST8.8.8.8192.168.2.30x4a6No error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:55:21.291465998 CEST8.8.8.8192.168.2.30xcd3eNo error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)
              May 14, 2022 18:55:26.008608103 CEST8.8.8.8192.168.2.30xaee9No error (0)6.tcp.ngrok.io3.141.210.37A (IP address)IN (0x0001)
              May 14, 2022 18:55:30.712841988 CEST8.8.8.8192.168.2.30x371aNo error (0)6.tcp.ngrok.io3.141.210.37A (IP address)IN (0x0001)
              May 14, 2022 18:55:35.332572937 CEST8.8.8.8192.168.2.30x6b7dNo error (0)6.tcp.ngrok.io18.189.106.45A (IP address)IN (0x0001)

              Click to jump to process

              Target ID:0
              Start time:18:53:25
              Start date:14/05/2022
              Path:C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\1DA2BAEDB633FD4884FCE89A2D9D8630C2E7AF359FE75.exe"
              Imagebase:0x300000
              File size:207360 bytes
              MD5 hash:7564920DF8FDAC8A30144D4297173194
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000000.242929781.0000000000302000.00000002.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Target ID:4
              Start time:18:53:37
              Start date:14/05/2022
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:"C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe"
              Imagebase:0xa30000
              File size:207360 bytes
              MD5 hash:7564920DF8FDAC8A30144D4297173194
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000000.267570909.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.286197022.0000000004031000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.286128721.0000000003031000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.285634821.0000000000A32000.00000002.00000001.01000000.00000005.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Joe Security
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: ditekSHen
              • Rule: NanoCore, Description: unknown, Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 83%, Metadefender, Browse
              • Detection: 98%, ReversingLabs
              Reputation:low

              No disassembly